Home :: Books :: Computers & Internet  

Arts & Photography
Audio CDs
Audiocassettes
Biographies & Memoirs
Business & Investing
Children's Books
Christianity
Comics & Graphic Novels
Computers & Internet

Cooking, Food & Wine
Entertainment
Gay & Lesbian
Health, Mind & Body
History
Home & Garden
Horror
Literature & Fiction
Mystery & Thrillers
Nonfiction
Outdoors & Nature
Parenting & Families
Professional & Technical
Reference
Religion & Spirituality
Romance
Science
Science Fiction & Fantasy
Sports
Teens
Travel
Women's Fiction
Hacking Exposed Linux, 2nd Edition (Hacking Exposed)

Hacking Exposed Linux, 2nd Edition (Hacking Exposed)

List Price: $49.99
Your Price: $32.99
Product Info Reviews

<< 1 2 3 4 5 >>

Rating: 5 stars
Summary: Just a must have
Review: It covers most important topic these days. Excellent examples/cases, software recommendaitions, solutions.... I do higly recommned this book.

Rating: 5 stars
Summary: Rocks!!!
Review: Man, this book is great! I've learned tons of tricks in the last five days with this book. This has so many examples and tools that you can really learn the hacker's secrets.

Rating: 5 stars
Summary: Reads like a conversation.
Review: Most technical books are either detailed and unreadable, or wordy and lack depth. This book is more like a conversation between the authors and the readers. Instead of pointing at things and letting you read other people's code, it walks you through the theory and exploits, letting you try out the attack manually on your own system as you read the book.

I actually wrote Mr. Hatch about a question, and he was extreemly helpful. Through a long conversation we had, I found that the authors taught classes at Northwestern University, which is probably where their communication skills came from. Unlike many experts out there who sit in a 30 minute session with 5 minutes of questions afterwards, these guys have had to actually teach students from the ground up for an entire term. Their skill in communicating, rather than just talking, really shows in their book.

Anyway, if you want a list of attacks against Linux systems, there are many books out there you'll be fine with. However if you want a book that will truely teach you what they are, how they work, and how to defend against them, there is only one option: Hacking Linux Exposed.

Rating: 5 stars
Summary: The best of the bunch
Review: My hubby got me 5 linux security books for christmas, and beeing the sweetie he is he let me have them early. I scanned through all of them quickly to pick which one was best to start with, and Hacking Linux Exposed won. Of all the books, this one had the most digestable format - each chapter is very standalone with well defined parts, but somehow it all manages to build on the stuff before. So you can read it without dedicating several hours each time -- you can very easily read a section between tasks at work, and soon you've read the whole thing. (Although last night I read through almost half of it again before going to bed, a failing of mine, and a complement tothe book.)

This book has the most complete instructions and examples of the books I got. I've started reading the others now, but keep thinking that 'hacking' did it better.

Rating: 5 stars
Summary: Wish I'd had this a few weeks earlier.
Review: My partner told me that I was to buy no computer books until after christmas because I'd be getting some under the tree. Well, we opened presents on the 24th this year, and I've been unable to put this book down since I opened it.

This book takes a very good look at all aspects of computer security from the Linux perspective. I was able to get several of the "Proactive Security" stuff from chapter 2 installed on my machine this afternoon, and was shocked to see how much my machine (we're on a cable modem) was being probed from all over. Looking at some of the traffic using the sniffers they describe, I could see some wierd stuff coming *FROM* my computer that wasn't caused by me.

I haven't gotten far in the book yet, but I've pulled it off the Internet until I have a chance to read the rest and can get these hackers off my machine. I've jumped up to part 3 of the book, where they have three whole chapters about what the bad guys do once they get on, and I've plugged five holes already. I have no idea how long I've been hacked, but by the time I'm done reading this book and using what they say, I can feel safe that I won't be such an easy target.

Rating: 4 stars
Summary: Can't put it down!!
Review: The book pulls you into a hackers/crackers mind! no boring bla-bla text that puts you to sleep in 3 minutes! the only reason I gave it 4 stars is that it didn't come with a CD! Most of the books I've read came with the programs they discussed in the book, This was my only let down. I've contacted the authors about some questions and I received a fast and curtious reply. Hats off to you Gents, and I must thank Brian for his reply,about to much security, your one of the reasons I've switched from windows to linux. Try and contact Bill if ya got a question about windows!

Rating: 5 stars
Summary: Must-Read Info For Linux Admins
Review: The Hacking Exposed books have set the bar for this genre of security book. Hacking Linux Exposed - 2nd Edition doesn't fail in meeting that bar as well. If you've read Hacking Exposed - 4th Edition and think this book can't tell you anything you don't already know- think again. For those who administer Linux boxes this book provides an in-depth look at specific hacks and vulnerabilities unique to the Linux operating system and the accompanying fixes and workarounds to protect yourself. The book is overflowing with examples and sample commands that users can immediately put to use to better understand the risks and how to mitigate them. Hacking Exposed is a must-read for security- this book is a must-read for Linux security.

Tony Bradley is a consultant and writer with a focus on network security, antivirus and incident response. He is the About.com Guide for Internet / Network Security (http://netsecurity.about.com), providing a broad range of information security tips, advice, reviews and information. Tony also contributes frequently to other industry publications. For a complete list of his freelance contributions you can visit Essential Computer Security (http://www.tonybradley.com).


Rating: 5 stars
Summary: good book
Review: This book is great anything and everything you've ever wanted to know about hacking linux or protecting yourself is right here in this book.

Rating: 5 stars
Summary: I feel it now...
Review: This book is very interesting, i've bought other books related to this subjecct and this one has new and informative information on the subject.

Rating: 5 stars
Summary: Saved me.
Review: This book really covers everything Linux. After getting half way through the book trying to implement things they talk about I found that my machine had already been hacked. So I started with a clean install like they suggest, made changes following the methods they list, and haven't been touched since.


<< 1 2 3 4 5 >>

© 2004, ReviewFocus or its affiliates